ElasticChain: Support Very Large Blockchain by Reducing Data Redundancy

Blockchains are secure by design and they have been widely used in digital asses, trade finance, information security and many other fields. However, the current blockchain protocol requires that each full node must contain the complete chain. When the storage capacity of a full node is less than that of the complete chain, this node cannot be a member of blockchain system. With the input data increasing, the number of full nodes in blockchains would decrease. The security of blockchains would significantly reduce. Therefore, we provide the ElasticChain, which can improve storage scalability under the premise of ensuring blockchain data safety. The full nodes in ElasticChain store the part of the complete chain based on the duplicate ratio regulation algorithm. Meanwhile, the node reliability verification method was used for increasing the stability of full nodes and reducing the risk of data imperfect recovering caused by the reduction of duplicate number. The experimental results on real datasets show that ElasticChain has the same stability, fault tolerance and security with the current blockchain system and it improves the storage scalability extremely.

[1]  T. V. Lakshman,et al.  The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet , 2016, HotNets.

[2]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[3]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[4]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[5]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[6]  Muneeb Ali,et al.  Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.

[7]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[8]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[9]  Tilman Wolf,et al.  A one-way proof-of-work protocol to protect controllers in software-defined networks , 2016, 2016 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).

[10]  Alan T. Litchfield,et al.  A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology , 2015, ACSC.

[11]  Tobias Distler,et al.  Resource-Efficient Byzantine Fault Tolerance , 2016, IEEE Transactions on Computers.

[12]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[13]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[14]  Ghassan O. Karame,et al.  Outsourced Proofs of Retrievability , 2014, CCS.

[15]  Ghassan O. Karame,et al.  On the Security and Scalability of Bitcoin's Blockchain , 2016, CCS.

[16]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.